The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture.
Penetration Testing, Threat Hunting, and Cryptography
This course is part of multiple programs.
Instructors: Dr. Manish Kumar
91,494 already enrolled
Included with
(2,384 reviews)
Recommended experience
What you'll learn
In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.
Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.
How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.
Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.
Skills you'll gain
Details to know
Add to your LinkedIn profile
15 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 6 modules in this course
This module provides an overview of the different phases of penetration testing, which includes planning, discovery, attack, verification, and reporting. You'll also learn about the fundamental concepts of penetration testing and its importance. The module will focus on the planning and discovery phases. The planning phase will cover the rules of engagement, which ensure penetration tests are conducted ethically and legally. Then, in the discovery phase, you will be introduced to passive and active reconnaissance methods and Google Dorking.
What's included
5 videos2 readings3 assignments7 plugins
This module focuses on the attack phase of penetration testing. You will learn about the key actions involved in the attack phase, including running exploits, bypassing defenses, gaining elevated privileges, and initiating post-attack activities. You will also explore various penetration testing tools and perform port and website scans using online penetration tools. Further, you will solidify your understanding of port scanning, network scanning, and network protocol analyzers through hands-on labs.
What's included
3 videos1 reading3 assignments3 app items3 plugins
This module focuses on the reporting phase of penetration testing, while introducing the concepts of software and application pen testing. You will learn how to scan code repositories for vulnerabilities and understand its benefits. You will also understand the importance of the reporting phase, create comprehensive penetration testing reports, and implement the Penetration Testing Execution Standard (PTES) framework, which provides insights into industry standards for reporting.
What's included
3 videos1 reading3 assignments5 plugins
This module provides an overview of threat hunting practices and the role of threat intelligence in cybersecurity. You will explore various threat intelligence sources and learn how to review recent security threat reports using IBM X-Force Threat Exchange. You'll also learn about threat intelligence platforms, security information and event management (SIEM) systems, threat intelligence frameworks, and threat hunting models. Additionally, you'll gain insights into the role of AI in enhancing threat intelligence and hunting capabilities.
What's included
5 videos1 reading3 assignments7 plugins
This module delves into the fundamental concepts and practices of cryptography, covering essential techniques for ensuring data integrity, confidentiality, and authenticity. You will gain insights into symmetric and asymmetric encryption algorithms like AES and RSA, as well as hashing techniques. The module also examines key management practices and crucial cryptographic techniques, such as securing SSL/TLS. Further, it addresses common cryptographic attacks and cryptanalysis techniques, providing a comprehensive understanding of cryptographic solutions for enhancing organizational security.
What's included
7 videos1 reading3 assignments2 app items7 plugins
In this module, you will apply the knowledge gained in the course in a final project. The module also wraps up the course learning and highlights key takeaways and next steps.
What's included
1 video2 readings1 peer review1 app item3 plugins
Instructors
Offered by
Recommended if you're interested in Security
Johns Hopkins University
Why people choose Coursera for their career
Learner reviews
2,384 reviews
- 5 stars
73.70%
- 4 stars
18.84%
- 3 stars
4.39%
- 2 stars
1.59%
- 1 star
1.46%
Showing 3 of 2384
Reviewed on Jul 27, 2020
Good for overview of topics. However more graded hands-on lab should be provided (as Google does) instead of just providing links in additional resources.
Reviewed on Aug 22, 2020
Very thorough topical information at the entry level that leaves you with confidence and knowledge afterwards. I am very thankful for this course and the whole IBM Cyber Pro Cert.
Reviewed on Aug 8, 2020
Good course which gives as much details about administration and infrastructure services . A Big thank you for IBM , Coursera and The instructor for giving a valuable knowledge to me. Thank you
New to Security? Start here.
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Penetration testing, or pen testing, is the process of simulating cyberattacks to identify vulnerabilities in an organization's security systems. It helps businesses strengthen their cybersecurity defenses by revealing weaknesses before malicious hackers can exploit them. Regular pen testing is crucial for maintaining data security and meeting compliance standards.
Threat hunting is a proactive cybersecurity strategy where experts search for potential threats within an organization's network, even if no alarm has been triggered. Unlike penetration testing, which focuses on identifying vulnerabilities through simulated attacks, threat hunting seeks out hidden or advanced threats that may bypass traditional security measures.
Penetration testing helps organizations strengthen their cybersecurity by identifying and addressing vulnerabilities before they can be exploited by attackers. Threat hunting, on the other hand, proactively seeks out hidden or advanced threats that evade traditional security measures. Together, these practices enhance an organization's ability to detect, prevent, and respond to cyberattacks, ensuring a more robust and resilient security posture.